HIPAA Security and HITECH Compliance Checklist

Size: px
Start display at page:

Download "HIPAA Security and HITECH Compliance Checklist"

Transcription

1 HIPAA Security and HITECH Compliance Checklist A Compliance Self-Assessment Tool

2 HIPAA SECURITY AND HITECH CHECKLIST The Health Insurance Portability and Accountability Act of 1996 (HIPAA) requires physicians and other healthcare providers who conduct electronic transactions to adopt certain security measures to safeguard protected health information (PHI) in electronic form. The Security Rule is designed to not only safeguard confidentiality of PHI but also ensures that the data you transmit or receive are not altered in the process and that the data in your information systems are available to appropriate individuals. The Security Rule is comprised of 3 main components: Administrative Safeguards These safeguards address your operations. They include assigning responsibility to someone for security and having policies and procedures in place to direct your security efforts. Physical Safeguards These safeguards address physical and facility related matters such as locks and keys, where computers are located, how electronic media are disposed of, and generally how to make the environment safe. Technical Safeguards These safeguards are focused on controlling access to systems and electronic PHI. They identify who may have access to information systems, provide access to sets of data and specific functions in systems, audit persons who have used the systems, and protect the systems from malicious software. Within each of the 3 components are a set of standards along with implementation specifications. Each Security Rule standard is a requirement that the covered entity must comply with respect to the electronic PHI it creates, transmits or maintains. In some cases, specifications have been designated as Addressable Specifications meaning that if the specification is not applicable to your practice, then the practice does not have to formulate policies and procedures, but do have to identify why the standard does not apply. However, most addressable specifications that are found in the Security Rule can be applied to most practices in a reasonable way. How to Use the HIPAA Privacy Checklist The checklist provides a detailed review of each of the compliance requirements under HIPAA Security and the HITECH Act. The check list has been designed to help practices easily understand what is required of them and evaluate if they are compliant. Each section includes: Review of required standards Implementation specifications under each standard Guidance and easy to understand explanations Assessment guidelines to ensure appropriate compliance Reference for applicable forms. The complete AAPC Physician Service Compliance Toolkit contains over 70 forms that are ready to use or can be customized for your specific medical practice. Forms referenced in the checklist correspond to the applicable forms provided in the Compliance Toolkit. Legal Notice The HIPAA Compliance Checklist does not constitute legal advice, and we are not acting as your attorney. The materials being provided are for informational purposes only and should not be used as a substitute for the advice of competent legal counsel.

3 Administrative Safeguards HIPAA Regulation: Security management The Security Management standard is intended to establish within a practice the implementation of appropriate policies and procedures to prevent, detect, contain, and correct security violations. Implementation Specification Guidance Assessment Y / N Risk Rating / Comments Assign Security Responsibility (a)(2) Practices are required to identify a security official who is responsible for the development and implementation of the policies and procedures required by HIPAA Security Rule. Security Officer Job Description Primary responsibilities of the medical practice privacy security officer should include: Establishing a security program and overseeing its implementation and compliance with regulatory standards. Ensure purchases of information technology are consistent with the practice's security policies. Investigating security incidents and regularly review IT system activity to ensure compliance. Ensure appropriate security training and awareness among practice staff. Annual review of compliance with security requirements, policies, and standards. The practice has designated a Privacy Security Officer and has appropriate job description and duties documented. (This can be the same person as the HIPAA Compliance Officer). Risk Analysis (a)(1)(ii)(A) Practices are required to conduct an assessment of the potential risks and vulnerabilities to the confidentiality, integrity, and availability of ephi. This process is intended to identify current security risks. HIPAA Security / HITECH Checklist Equipment / IT Inventory Sheet Risk Management (a)(1)(ii)(B) Practices are required to implement security measures sufficient to reduce risks and vulnerabilities identified during the risk analysis and to stay compliant with HIPAA security standards. This process is intended to ensure ongoing control of security risks. Employee Training Attendance Sheet Employee Compliance Training Log The risk assessment should include the following: Identifies potential security risks to ephi Rates the likelihood of occurrence for security risk. Rates the extent of damage each risk might cause. Description of controls the practice has implemented to limit any vulnerability or reduce risk. In addition to the risk analysis, the practice should include an inventory of all IT equipment and systems used (software, hardware) and who has access to each system. A one-time comprehensive HIPAA security training is required for all employees. Ongoing education of employees pertaining to HIPAA updates throughout the year should be provided and employers should keep employees updated of any significant policy or procedure changes. All employees should receive annual re-training of HIPAA standards The practice has conducted and documented a risk assessment to evaluate and indentify any vulnerabilities and their impact to ephi within the last 3 years. As part of the risk assessment, the practice maintains an inventory of all information technology assets / equipment. The designated security official annually reviews, updates and approves the risk analysis. The practice regularly reviews all HIPAA Security policies and procedures and updates them as needed. Employees have received training and awareness on security measures. Additionally, employees date and initial updates throughout the year and kept in file.

4 Implementation Specification Guidance Assessment Y / N Risk Rating / Comments Sanction Policy (a)(1)(ii)(C) A practice is required to apply appropriate sanctions against employees who fail to comply with the practice s security policies and procedures. The policy should incorporate penalties that are based on and appropriate for the severity of the violation and also outline the process for reporting non-compliant employees. The practice has a formal, documented disciplinary policy. Sanction Policy Template Employee Disciplinary Action Form Information System Activity Review (a)(1)(ii)(D) Practices are required to implement procedures to regularly review records of information system activity, such as audit logs, access reports, and security incident tracking reports. IT System Activity Review Log The purpose is to ensure that someone is regularly monitoring the practice s systems for any unauthorized access. Any disciplinary action taken is documented and maintained in the employees file. The security official periodically reviews system activity via audit logs and access reports to identify any patterns or breaches contrary to the practice s access and security policy and procedures. A record is maintained of all reviews of security incidents and system activity. Incidents requiring follow up related to suspicious system activity are documented along with any corrective actions. Administrative Safeguards HIPAA Regulation: Workforce Security (a)(3)(i) The workforce security standard is intended to establish policies and procedures to ensure that all employees have appropriate access to ephi and to prevent those who do not/should not have access from obtaining access to ephi. Only those staff members or workforce members who need access to particular information should be able to view and/or modify ephi. Authorization and/or Supervision (a)(3)(ii)(A) Practices should implement procedures for the authorization and/or supervision of employees who work with ephi or in locations where it might be accessed. Access to ephi, should be based on the staff member's job responsibilities and qualifications. Authorization should be limited to the information the individual needs to fulfill his or her job responsibilities. The practice has implemented procedures for the authorization or supervision of employees working with ephi. Practice has job descriptions for each job type which includes job responsibilities and what access to ephi is appropriate for that position. Employee IT Access List Employee Confidentiality Statement The administrator or security officer is responsible for reviewing access rights and determining appropriate access levels. A list is maintained documenting what systems employees have access to along with their usernames.

5 Staff members not authorized to access ephi are supervised when they have an opportunity to obtain or access such information. (e.g. maintenance personnel working on computer). All employees have signed a confidentiality statement. The practice maintains a list. Workforce Clearance Procedures (a)(3) Implement procedures to determine that the access of a workforce member to ephi is appropriate. Termination Procedures (a)(3) Implement procedures for terminating access to ephi when the employment of a workforce member ends. Employee Termination Checklist The practice should evaluate potential employees to determine their character is suitable to adhere to your policies and procedures for protecting ephi. The practice is responsible for ensuring all access privileges are no longer active when an employee or contractor leaves (voluntarily or involuntarily). This includes access to data, networks, accounts, work station and servers, as well as any physical access or keys to access areas where ephi may be located. The practice has a formal process for screening job candidates and conducting background checks as part of the hiring process. The practice has developed and utilizes a termination check list which includes terminating IT system privileges. Audit Check: Review termed employee and verify system privileges have been revoked. A process is in place for disabling an employee s password and access privileges upon termination. This should occur immediately upon notifying the employee of termination. Return of any related equipment, keys, security badges, PDAs is tracked and logged as part of the termination process. A process is in place to ensure employees upon termination do not retain or remove from the clinic any information, computer files or equipment belonging to the clinic. For example escorting terminated employees out of the practice.

6 Administrative Safeguards HIPAA Regulation: Information Access Management (a)(4) The information access management standard is intended to establish within practices policies and procedures for authorizing access to electronic PHI that are consistent with HIPAA security requirements. The purpose is to minimize any risk of inappropriate disclosure, destruction or altercation of ephi. Isolating Health care Clearinghouse Function (a)(4) This requirement is only applicable to a practice that may include clearinghouse services as part of their organization. Requires clearinghouses that are part of larger organizations to implement policies and procedures that protect ephi of the clearinghouse from unauthorized access by the larger organization. Electronic PHI processed by the clearinghouse is isolated from the other information that the practice processes. Access Authorization (a)(4) Implement policies and procedures for granting access to ephi, for workstations, transactions, programs, processes, or other mechanisms. This can be covered under the workforce security standard for authorization and supervision. Computers, terminals or other devices where ephi can be accessed require user ID and password or supervision when being used. IT systems are set up to automatically logout a user after a short period of inactivity and requires a password to re-enter the application. IT system is configured to only allow the user access to predetermined sets or areas of information relevant to their job duties. Access Establishment and Modification (a)(4) Implement policy and procedures, based on access authorization policies, to establish, document, review, and modify user's rights of access to workstations, transactions, programs, or processes. IT Access Change Request This can be covered under the workforce security standard for authorization and supervision. Changes to staff members access privileges is done using a formal written request which is reviewed and authorized by the appropriate security official.

7 Administrative Safeguards HIPAA Regulation: Security Awareness and Training (a)(5)(i) Practices are required to implement a security awareness and training program for all members of its workforce, including management. Security Training and Reminders (a)(5) Implement periodic reminders of security and information safety best practices. Employee Compliance Training Log A practice is required to provide a formal initial training for all members of its workforce, as well as, any new employees. Periodic training is also required whenever the practice makes significant changes to any policies or procedures affecting ephi security or if / when changes to HIPAA Security regulations occur. The practice has a formal training program regarding HIPAA security rules. All employees have received formal training to understand and meet the provisions of the Security Rule (documented training log). The practice provides periodic updates and reminders to employees through memos, s or signs in the practice. A mechanism is in place to notify employees of any changes to IT systems or updates to security policy and procedures. All updates should be documented / dated. Protection from Malicious Software (a)(5) Implement procedures for guarding against, detecting, and reporting malicious software. Computer viruses and attacks pose a significant risk to any business or medical practice. Practices need to be vigilant regarding limiting the use of the internet and downloading software programs by its employees. The practice has installed anti-virus / dedication software such as Symantec, Norton or McAfee on workstations and servers. Anti-virus / dedication software in use is a current version. A log is maintained of any virus / infection detections and successful eradication / cleaning. Log-in Monitoring (a)(5) Implement procedures for monitoring and reporting log-in attempts and discrepancies. This can be covered under the security management standard for information system activity review. For added protection, it is recommended that the practice set up their system to lock out users after a specified failed number of attempts (if the system has the capability). Appropriate policies and procedures are in place limiting computer and use that could pose risk of infection to the practice. An audit log or exception report (indicating when there has been a problem logging in by a user) is generated and reviewed periodically. A record is maintained documenting any investigations that may have resulted.

8 Password Management (a)(5)(ii)(D) Implement procedures for creating, changing, and safeguarding appropriate passwords. Employee IT Access List A portion of this standard can be covered under the workforce security standard for authorization and supervision. Each employee with access to IT system is assigned a unique user ID and required to create a password in order to access the system. A list is maintained documenting what systems employees have access to along with their usernames. This list is only accessible by appropriate individuals. System requires employees to periodically change their passwords (minimum every 6 months). A process is in place for immediate termination of an individual s password and access privileges. Passwords are not written down by employees and are not shared with others. Security Incident Procedures (a)(6) Practices are required to identify and respond to suspected or known security incidents and mitigate, if possible any harmful effects, and document such incidents and their outcomes. Security Incident Report A security incident is the attempted or successful unauthorized access, use or disclosure, modification, or destruction of information or IT operating systems. Examples may include: stolen passwords, corrupted back-up tapes, virus attacks, accounts being used by another individual, failure to terminate an account of a former employee. Procedures are in place for reporting security incidents. All staff has been trained on these procedures. The practice maintains a security incidents report which includes a record of actions taken to resolve the issue and mitigate any future recurrence.

9 Administrative Safeguards HIPAA Regulation: Contingency Planning (a)(7)(i) Requires practices to establish (as needed) policies and procedures for responding to an emergency or natural disaster. For example, fire, vandalism, system failure, floods and earthquakes may damage systems that contain electronic protected health information. This standard is intended to ensure a practice has the ability to recover its ephi in the event of an emergency or disaster. Contingency Plan (a)(7)(i) Practice Contingency Plan A contingency plan helps to ensure business continuity during any type of emergency. The contingency plan should include details regarding: What disasters could affect integrity of ephi Actions the practice will take to ensure access and integrity of ephi as the result of an emergency / disaster. The roles and responsibilities of staff in the event of an emergency or disaster. The practice has a formal contingency plan which is reviewed and updated annually. Data Backup Plan (a)(7) Establish and (implement as needed) procedures to create and maintain retrievable, exact copies of ephi during unexpected negative events. Disaster Recovery Plan (a)(7) Establish (and implement as needed) procedures to restore any loss of data. Equipment / IT Inventory Sheet Emergency Mode Operation Plan (a)(7) Establish (and implement as needed) procedures to enable continuation of critical business processes for protection of ephi while operating in emergency mode. As part of the overall contingency plan, the practice should create and maintain copies of its ephi. Backups should typically occur each day and tangible copies should be stored off-site. As part of the overall contingency plan, the disaster recovery plan should outline what data must be restored and how it is to be restored. A cop of the recovery plan should be kept off-site along with the practice s copies of backup data. As part of the overall contingency plan, the emergency mode operations plan should include an emergency contact list including a list of individuals to be notified in an emergency. This should include a list of police, fire, building maintenance, pluming, and electrician numbers. Paper forms should be readily available in case of a The practice has identified what information must be backed up, the method of back-up and frequency. Verify backup copies are being created and stored according to the data backup plan. Backup copies of data and ephi are stored in a secure but accessible location and manner that prevents unauthorized access. The practice has established procedures for restoring ephi that is inadvertently destroyed or corrupted. These procedures are documented in the practice s contingency plan. The practice has established procedures for replacing critical equipment and applications as part of the disaster recovery plan. The disaster recovery plan includes provisions for taking an inventory of any loss of or damage to equipment or data. The contingency plan includes operating procedures during an emergency, including what essential information will be made available. The emergency mode operations plan includes a list of individuals and contact information to be notified in case of an emergency, their roles and responsibilities, and alternate means of security during restoration.

10 power outage (i.e. registration, consent forms and progress notes). All staff has been trained on their responsibilities in the event of an emergency. The practice has a back-up power source that allows for maintaining system integrity in the event of a power disruption. Red outlets should be installed to indicate those outlets provide electricity by back-up power source. Testing and Revision Procedures (a)(7) Practices should implement procedures for periodic testing and revision of contingency plans. Each component of the contingency plan (data backup, disaster recovery, and emergency mode operations) should be tested periodically to ensure its effectiveness and revised if needed to address any discrepancies. The practices contingency plan has been reviewed and tested within the last 12 months, and updated (if applicable). Back up data has been tested to ensure accuracy of data and information and that it can be successfully restored / retrieved. Emergency power supplies are tested on a routine basis. Fire alarms and suppression equipment has been tested to confirm they function properly. Applications and Data Criticality Analysis (a)(7) If applicable, practices should assess the relative criticality of specific applications and data in support of other contingency plan components. Equipment / IT Inventory Sheet Evaluation Policy (a)(8) Perform periodic technical & nontechnical evaluations, to establish how well security policy and procedures meet the requirements of this subpart. This list should be maintained as part of your Disaster Recovery Plan. Practice must periodically evaluate their security plans and procedures to ensure their continued effectiveness. A technical evaluation should be conducted by IT experts or your vendor due to the complexity of computer systems. Staff has reviewed the contingency plan including roles and responsibilities within the last 12 months. The practice has conducted a review of which applications, equipment and data are most critical for providing patient care. Based on the review, the practice maintains a prioritized list to ensure the most critical applications or equipment is restored first. The list is updated annually. The practice s compliance with security standards and implementation specifications has been evaluated within the last 12 months.

11 Administrative Safeguards HIPAA Regulation: Business Associate Contracts and Other Arrangements (b)(1) A practice may permit a business associate to create, receive, maintain, or transmit electronic protected health information on the practice s behalf only if the practice obtains satisfactory assurances that the business associate will appropriately safeguard the information. Written Contract or Other Arrangements (b)(4) Satisfactory assurances required by the business associate contract standard are documented in a written contract or other arrangement that allows business associates PHI access and confidential access of the practice. Business Associate Agreement Business Associate Checklist Note, that a written contract is not required with respect to transmission of ephi for the following TPO (Treatment, Payment and Operational) reasons: By covered entity to a healthcare provider concerning the treatment of an individual. By health plan, HMO or health insurance issuer on behalf of a group health plan to a plan sponsor. From or to other agencies providing the services when the covered entity is a health plan that is a government program providing public benefits. The practice has identified all individuals or entities that are business associates and required them to sign a business associate agreement. Business associate and other arrangements (i) The contract known as the business associate agreement between a practice and its business associate must contain the required information prescribed by the HIPAA Security Rules. If a covered entity is aware or suspects that a business associate is in material breach of the business associate's obligation under the contract, they must take reasonable steps to cure the breach or end the violation. This may involve: 1. Terminating the contract with the business associate, if feasible. 2. If termination is not feasible, report the problem to the Secretary. Business associate contracts. The contract between a covered entity and a business associate must provide that the business associate will (A) Implement administrative, physical, and technical safeguards that reasonably and appropriately protect the confidentiality, integrity, and availability of the electronic protected health information that it creates, receives, maintains, or transmits on behalf of the covered entity as required by this subpart; (B) Ensure that any agent, including a subcontractor, to whom it provides such information agrees to implement reasonable and appropriate safeguards to protect it; (C) Report to the covered entity any security incident of which it becomes aware; (D) Authorize termination of the contract by the covered entity, if the covered entity determines that the business associate has violated a material term of the contract. Business associate agreements contain appropriate assurances and termination provisions.

12 Physical Safeguards HIPAA Regulation: Facility Access Controls (a)(1) A practice is required to implement policies and procedures to limit physical access to its electronic information systems and the facility or facilities in which they are housed, while ensuring that properly authorized access is allowed. Contingency Operations Procedures (a)(2)(i) Establish (and implement as needed) procedures that ensure facility access to support restoration of lost data in the event of an emergency. Staff responsible for implementing contingency plans can physically obtain back-up data sets. Facility Security Plan (a)(2)(ii) A practice should have policies and procedures to safeguard the facility and their equipment from unauthorized physical access, tampering, and theft. Records or computer equipment other than workstations are kept in locked areas or cabinets. Only staff members authorized to use or maintain IT equipment or servers has access to secure areas (e.g. keys to locked areas are only issued to authorized individuals). Back-up media stored off-site are stored in a manner that prevents physical access by anyone lacking proper authorization. Contractors and maintenance personnel who are not members of the staff have signed a business associate agreement. Contractors and maintenance personnel are given a unique user ID and password that enables the practice to monitor their access to the medical practice's IT resources. Ideally the system should be able to create a one-time access password. Before a user ID is activated, the security official reviews with the contractor the practice's security policies and procedures and the provisions of the business associate agreement related to security. The practice has appropriate fire suppression systems in place that are compliant with all safety and building codes. The practice has appropriate security alarm or surveillance systems in place.

13 Access Control and Validation Procedures (a)(2)(iii) A practice should have procedures to control and validate individual access to facilities based on role or function; including visitor control, and access control for software testing and revision. All visitors to the medical practice register with the receptionist and sign a visitor log and are required to wear a visitor s badge. Visitors to the medical practice are not left alone (except in public waiting areas). Visitors to the medical practice are not allowed to roam unaccompanied by a staff member. Maintenance Records (a)(2)(iv) A practice is required to document repairs and modifications to the physical components of its facility which are related to security. Facility Maintenance Record Examples of applicable repairs may include (but not limited to) any repairs or modifications done to facility hardware, security systems, walls, doors and locks. All repairs and/or modifications made to the building related to security are documented. Physical Safeguards HIPAA Regulation: Workstation Use (b) Implement policies and procedures that specify the proper functions to be performed, the manner in which those functions are to be performed, and the physical attributes of the surroundings of a specific workstation or class of workstation that can access electronic protected health information. This standard does not have corresponding implementation specifications. However, compliance with the standard itself is required. The practice should have guidelines and policies in place to ensure appropriate use of workstations located throughout the practice including in private office areas. Work stations located in common but non-public areas are not used to perform security related administrative functions (e.g. adjusting access rights). Workstations are set up to restrict the functions it can perform based on the level of permissions assigned to each user. Users are required to log off all workstations rather than leaving them unattended. This includes workstations in private offices. All workstations and monitors are positioned so that they are visible only to the persons who use them or the practice uses privacy screens. Workstation areas are kept clean and well organized. Paper or confidential material is securely kept.

14 Physical Safeguards HIPAA Regulation: Workstation Security (c) Implement physical safeguards for all workstations that access ephi, to restrict access to authorized users. This standard does not have corresponding implementation specifications. However, compliance with the standard itself is required. Workstations are located in physically secure areas where it is not vulnerable to theft or unauthorized removal from the office. Physical Safeguards HIPAA Regulation: Device and Media Controls (d)(1) Implement policies and procedures that govern the receipt and removal of hardware and electronic media that contain electronic protected health information into and out of a facility, and the movement of these items within the facility. Media Disposal & Disposition or Reuse (d)(2)(i), (ii) The practice has policies and procedures for removing ephi from hardware or electronic media on which it is stored prior to disposal or re-use. Electronic media may include (but not limited to) things such as PDAs, thumbnail drives, computers, disks, cell phones etc. The practice has process for erasing or purging ephi on equipment and other media that is either going to be re-used, recycled or disposed of. The Security Officer checks all media or equipment to ensure ephi has been properly removed prior to any re-use or disposal. Hardware & Media Accountability (d) (2)(iii) The practice is required to maintain records of the movements of hardware and electronic media, and any person responsible therefore. Equipment / IT Inventory Sheet The practice maintains an inventory of all equipment and property (e.g. fax, copiers, and computers) by location and person responsible for it. Authorization forms and receipts are required for all major property or equipment transactions. Any personal devices or laptop computers that are allowed to be removed from the clinic are properly managed / monitored. Authorization is required before any ephi can be downloaded unto these devices. Fax machines are located in a secure or supervised area.

15 Data Backup and Storage (d) (2)(iv) Create a retrievable, exact copy of electronic protected health information, when needed, before movement of equipment. The practice should make a copy of ephi prior to moving any equipment such as computers that contains protected health information. Before moving any equipment the practice creates back-up copies of ephi, which are retained until the equipment has been moved and restarted. Technical Safeguards HIPAA Regulation: Access Controls (a)(1) Implement technical policies and procedures for electronic information systems that maintain electronic protected health information to allow access only to those persons or software programs that have been granted access rights. General Specifications regarding use. Sample Language: This , including attachments, may include confidential and/or proprietary information, and may be used only by the person or entity to which it is addressed. If the reader of this e mail is not the intended recipient or his or her authorized agent, the reader is hereby notified that any dissemination, distribution or copying of this e- mail is prohibited. If you have received this in error, please notify the sender by replying to this message and delete this immediately. All s sent from the practice contain a confidentiality / privacy statement. Web-based account such as (but not limited to) yahoo and hotmail are not allowed to be used for transmitting any type of ephi. The clinic has a policy restricting or minimizing the use of personal accounts from work. The clinic restricts the use of instant messaging, particularly, regarding any transmission of ephi. Unique User Identification (A)(2)(i) Assign a unique name and/or number for identifying and tracking user identity. All employees of the clinic are given a unique username and password for accounts and accessing IT systems. Guest accounts for accessing IT systems do not permit access to ephi or grant any administrative controls. Sharing passwords or user accounts is strictly prohibited. Passwords require the use of letters, numbers and/or symbols to ensure effective protection.

16 Emergency Access Procedure (a)(2)(ii) Establish (and implement as needed) procedures for obtaining necessary ephi during an emergency. The practice has the ability to access user accounts and reset passwords in the event of an emergency. Automatic Logoff (a)(2)(iii) Implement electronic procedures that terminate an electronic session after a predetermined time of inactivity. Encryption and Decryption (a)(2)(iv) Implement an appropriate mechanism to encrypt and decrypt ephi. Encrypting is not strictly required and may be costly for many practices. If this is not a viable option due to cost, you should document any alternative methods used to ensure confidentiality. Examples may include using password protection of documents or files containing ephi and/or prohibiting the transmission of ephi via . Fax machines do not require any special encryption. Users are automatically logged off after a period of inactivity and required to log back into the system. ephi that is transmitted via is encrypted. PDAs or other mobile devices are not used to transmit or receive ephi unless they have been encrypted. Technical Safeguards HIPAA Regulation: Audit Controls (b) Implement hardware, software, and/or procedural mechanisms that record and examine activity in information systems that contain or use ephi. This standard does not have corresponding implementation specifications. However, compliance with the standard itself is required. Most information systems contain audit controls that allow for tracking of system use and resources. When looking for security issues, things like failed login attempts can help alert you to any possible issues. Information systems used by the practice maintain a log of activity including user access and transmissions of ephi (e.g. billing transactions). Activity logs are periodically reviewed to identify any potential security issues.

17 Technical Safeguards HIPAA Regulation: Integrity Controls Policy (c)(1) Implement policies and procedures to protect electronic protected health information from improper alteration or destruction. Mechanism to Authenticate Electronic PHI (c)(2) Implement electronic mechanisms to corroborate that ephi not been altered or destroyed in an unauthorized manner. Only authorized individuals are able to access and alter ephi. Technical Safeguards HIPAA Regulation: Person Or Entity Authentication (d) Implement procedures to verify that a person or entity seeking access to electronic protected health information is the one claimed. This standard does not have corresponding implementation specifications. However, compliance with the standard itself is required. All systems used by the practice containing ephi require the user to authenticate themselves prior to accessing the system (e.g. such as a password or PIN). Technical Safeguards HIPAA Regulation: Transmission Security (e)(1) Implement technical security measures to guard against unauthorized access to electronic protected health information that is being transmitted over an electronic communications network. Integrity Controls (e)(2)(i) Implement security measures to ensure that electronically transmitted ephi is not improperly modified without detection until disposed of. This standard is focused on ensuring appropriate controls to help maintain the integrity of your records and prevent any accidental or intentional altercation or destruction of ephi during the transmission process. Various software can be used such as: Checksum Adds up components of files and compares them between the old and new file to ensure nothing was corrupted. Error detecting software Detects and reports any errors that may occur during data transmission. The practice has implemented mechanisms that can be used to confirm ephi has not been altered.

18 Encryption (e)(2)(ii) Implement a mechanism to encrypt electronic protected health information whenever deemed appropriate. Based on your required risk analysis determine if encryption is needed to protect the transmission of ephi between your office and outside organizations. This should be addressed under Encryption and Decryption (a)(2)(iv) NA Breach Notification HIPAA Regulation: Breach Notification The Breach Notification rule establishes the requirements a medical practice must follow in the event of a breach (unauthorized disclosure or use) of unsecured protected health information. General Rule. Breaches do not include: Under HIPAA a breach is considered to have occurred when there is a disclosure or use of unsecured protected health information that poses a significant risk of financial, reputational or other harm to the affected individual. Unsecured PHI means that the information has not been rendered unusable, unreadable, or indecipherable to someone who has accessed it without authorization. Breach Notification Letter to HHS Breach Notification Letter to Individual Breach Notification Letter to Media HIPAA Incident & Resolution Form HIPAA Incident Summary Log Breach Notification Checklist Unintentional access or use of PHI by an employee or person acting under the authority of the clinic or a business associate, if access or use was made in good faith and within the scope of authority and does not result in further use or disclosure of the information. Any inadvertent disclosure between individuals who are authorized to access PHI within the clinic or business associate, or organized health care arrangement in which the covered entity participates, and the information received as a result of such disclosure is not further used or disclosed. If there is a good faith belief by the clinic or business associate that the unauthorized person to whom the disclosure was made would not reasonably have been able to retain such information. Individual Notification Requirements Your clinic is deemed responsible beginning the first day that a breach is discovered. The practice is required to notify each individual who s PHI has been, or is reasonably believed to have been accessed or used as a result of the breach. The practice has a policy and procedure in place outlining notification protocols in case of a breach related to protect health information. A practice is required to provide notification no later than 60 calendar days after discovery of a breach. Notification should be sent first class mail to the last known address, or electronic mail (if approved by the individual). If the individual is deceased, notice should be sent to their next of kin or personal representative. If there is urgency because of possible imminent misuse of unsecured protected health information, the covered entity may provide information to individuals The practice maintains on file all documented incidents using an Incident and Resolution Form.

19 by telephone or other means. The notification must include: A brief description of what happened The date of the breach and the date of discovery (if known) Description of the types of information involved Steps individuals should take to protect themselves Description of what the practice involved is doing to investigate the breach, mitigate any damage and action taken to protect against any further breaches Contact information for the practice Media Notification Requirements If a breach entails more than 500 individuals, than the Media is required to be notified in the form of a press release, otherwise there is no requirement to notify the media. The media was notified of any breaches entailing 500 or more individuals (if applicable). Secretary Notification Requirements If a breach includes individuals of 500 or less, the practice must notify the Secretary of the Department of Health and Human Services through the HHS website. The report can be made annually. For breaches involving 500 or more individuals, the report must be filed within 60 days. The practice maintains a summary log of all documented incidents. The log is used to provide the required report to HHS annually for all incidents involving less than 500 individuals.

VMware vcloud Air HIPAA Matrix

VMware vcloud Air HIPAA Matrix goes to great lengths to ensure the security and availability of vcloud Air services. In this effort VMware has completed an independent third party examination of vcloud Air against applicable regulatory

More information

HIPAA/HITECH PRIVACY & SECURITY CHECKLIST SELF ASSESSMENT INSTRUCTIONS

HIPAA/HITECH PRIVACY & SECURITY CHECKLIST SELF ASSESSMENT INSTRUCTIONS HIPAA/HITECH PRIVACY & SECURITY CHECKLIST SELF ASSESSMENT INSTRUCTIONS Thank you for taking the time to fill out the privacy & security checklist. Once completed, this checklist will help us get a better

More information

HIPAA Security Checklist

HIPAA Security Checklist HIPAA Security Checklist The following checklist summarizes HIPAA Security Rule requirements that should be implemented by covered entities and business associates. The citations are to 45 CFR 164.300

More information

HIPAA Audit Processes HIPAA Audit Processes. Erik Hafkey Rainer Waedlich

HIPAA Audit Processes HIPAA Audit Processes. Erik Hafkey Rainer Waedlich HIPAA Audit Processes Erik Hafkey Rainer Waedlich 1 Policies for all HIPAA relevant Requirements and Regulations Checklist for an internal Audit Process Documentation of the compliance as Preparation for

More information

HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics

HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 5. 2. Security Standards - Organizational, Security Policies Standards & Procedures, - Administrative and Documentation Safeguards

More information

SECURITY RISK ASSESSMENT SUMMARY

SECURITY RISK ASSESSMENT SUMMARY Providers Business Name: Providers Business Address: City, State, Zip Acronyms NIST FIPS PHI EPHI BA CE EHR HHS IS National Institute of Standards and Technology Federal Information Process Standards Protected

More information

HIPAA Security Alert

HIPAA Security Alert Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information

More information

HIPAA Security Series

HIPAA Security Series 7 Security Standards: Implementation for the Small Provider What is the Security Series? The security series of papers provides guidance from the Centers for Medicare & Medicaid Services (CMS) on the rule

More information

HIPAA Information Security Overview

HIPAA Information Security Overview HIPAA Information Security Overview Security Overview HIPAA Security Regulations establish safeguards for protected health information (PHI) in electronic format. The security rules apply to PHI that is

More information

SAMPLE HIPAA/HITECH POLICIES AND PROCEDURES MANUAL FOR THE SECURITY OF ELECTRONIC PROTECTED HEALTH INFORMATION

SAMPLE HIPAA/HITECH POLICIES AND PROCEDURES MANUAL FOR THE SECURITY OF ELECTRONIC PROTECTED HEALTH INFORMATION SAMPLE HIPAA/HITECH POLICIES AND PROCEDURES MANUAL FOR THE SECURITY OF ELECTRONIC PROTECTED HEALTH INFORMATION Please Note: 1. THIS IS NOT A ONE-SIZE-FITS-ALL OR A FILL-IN-THE BLANK COMPLIANCE PROGRAM.

More information

Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH)

Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH) Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH) Table of Contents Introduction... 1 1. Administrative Safeguards...

More information

Policies and Procedures Audit Checklist for HIPAA Privacy, Security, and Breach Notification

Policies and Procedures Audit Checklist for HIPAA Privacy, Security, and Breach Notification Policies and Procedures Audit Checklist for HIPAA Privacy, Security, and Breach Notification Type of Policy and Procedure Comments Completed Privacy Policy to Maintain and Update Notice of Privacy Practices

More information

UNIVERSITY OF CALIFORNIA, SANTA CRUZ 2015 HIPAA Security Rule Compliance Workbook

UNIVERSITY OF CALIFORNIA, SANTA CRUZ 2015 HIPAA Security Rule Compliance Workbook Introduction Per UCSC's HIPAA Security Rule Compliance Policy 1, all UCSC entities subject to the HIPAA Security Rule ( HIPAA entities ) must implement the UCSC Practices for HIPAA Security Rule Compliance

More information

Appendix 4-2: Sample HIPAA Security Risk Assessment For a Small Physician Practice

Appendix 4-2: Sample HIPAA Security Risk Assessment For a Small Physician Practice Appendix 4-2: Administrative, Physical, and Technical Safeguards Breach Notification Rule How Use this Assessment The following sample risk assessment provides you with a series of sample questions help

More information

HIPAA Security. assistance with implementation of the. security standards. This series aims to

HIPAA Security. assistance with implementation of the. security standards. This series aims to HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 2. Security Standards - Administrative Safeguards 3. Security Standards - Physical Safeguards 4. Security Standards - Technical

More information

HIPAA SECURITY RISK ASSESSMENT SMALL PHYSICIAN PRACTICE

HIPAA SECURITY RISK ASSESSMENT SMALL PHYSICIAN PRACTICE HIPAA SECURITY RISK ASSESSMENT SMALL PHYSICIAN PRACTICE How to Use this Assessment The following risk assessment provides you with a series of questions to help you prioritize the development and implementation

More information

HIPAA Security. 4 Security Standards: Technical Safeguards. Security Topics

HIPAA Security. 4 Security Standards: Technical Safeguards. Security Topics HIPAA Security S E R I E S Security Topics 1. Security 101 for Covered Entities 2. Security Standards - Administrative Safeguards 3. Security Standards - Physical Safeguards 4. Security Standards - Technical

More information

Krengel Technology HIPAA Policies and Documentation

Krengel Technology HIPAA Policies and Documentation Krengel Technology HIPAA Policies and Documentation Purpose and Scope What is Protected Health Information (PHI) and What is Not What is PHI? What is not PHI? The List of 18 Protected Health Information

More information

HIPAA Security. 2 Security Standards: Administrative Safeguards. Security. Topics

HIPAA Security. 2 Security Standards: Administrative Safeguards. Security. Topics HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 5. 2. Security Standards - Organizational, Security Policies Standards & Proc - A edures, dministrativ and e Documentation Safeguards

More information

ITS HIPAA Security Compliance Recommendations

ITS HIPAA Security Compliance Recommendations ITS HIPAA Security Compliance Recommendations October 24, 2005 Updated May 31, 2010 http://its.uncg.edu/hipaa/security/ Table of Contents Introduction...1 Purpose of this Document...1 Important Terms...1

More information

Policies and Compliance Guide

Policies and Compliance Guide Brooklyn Community Services Policies and Compliance Guide relating to the HIPAA Security Rule June 2013 Table of Contents INTRODUCTION... 3 GUIDE TO BCS COMPLIANCE WITH THE HIPAA SECURITY REGULATION...

More information

HIPAA Compliance Guide

HIPAA Compliance Guide HIPAA Compliance Guide Important Terms Covered Entities (CAs) The HIPAA Privacy Rule refers to three specific groups as covered entities, including health plans, healthcare clearinghouses, and health care

More information

HIPAA Security COMPLIANCE Checklist For Employers

HIPAA Security COMPLIANCE Checklist For Employers Compliance HIPAA Security COMPLIANCE Checklist For Employers All of the following steps must be completed by April 20, 2006 (April 14, 2005 for Large Health Plans) Broadly speaking, there are three major

More information

Heather L. Hughes, J.D. HIPAA Privacy Officer U.S. Legal Support, Inc. hhughes@uslegalsupport.com www.uslegalsupport.com

Heather L. Hughes, J.D. HIPAA Privacy Officer U.S. Legal Support, Inc. hhughes@uslegalsupport.com www.uslegalsupport.com Heather L. Hughes, J.D. HIPAA Privacy Officer U.S. Legal Support, Inc. hhughes@uslegalsupport.com www.uslegalsupport.com HIPAA Privacy Rule Sets standards for confidentiality and privacy of individually

More information

How To Write A Health Care Security Rule For A University

How To Write A Health Care Security Rule For A University INTRODUCTION HIPAA Security Rule Safeguards Recommended Standards Developed by: USF HIPAA Security Team May 12, 2005 The Health Insurance Portability and Accountability Act (HIPAA) Security Rule, as a

More information

An Effective MSP Approach Towards HIPAA Compliance

An Effective MSP Approach Towards HIPAA Compliance MAX Insight Whitepaper An Effective MSP Approach Towards HIPAA Compliance An independent review of HIPAA requirements, detailed recommendations and vital resources to aid in achieving compliance. Table

More information

Healthcare Compliance Solutions

Healthcare Compliance Solutions Healthcare Compliance Solutions Let Protected Trust be your Safe Harbor In the Health Information Technology for Economic and Clinical Health Act of 2009 (HITECH), the U.S. Department of Health and Human

More information

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) UNIVERSITY OF PITTSBURGH POLICY SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) DATE: March 18, 2005 I. SCOPE This

More information

HIPAA/HITECH: A Guide for IT Service Providers

HIPAA/HITECH: A Guide for IT Service Providers HIPAA/HITECH: A Guide for IT Service Providers Much like Arthur Dent in the opening scene of The Hitchhiker s Guide to the Galaxy (HHGTTG), you re experiencing the impact of new legislation that s infringing

More information

Healthcare Management Service Organization Accreditation Program (MSOAP)

Healthcare Management Service Organization Accreditation Program (MSOAP) ELECTRONIC HEALTHCARE NETWORK ACCREDITATION COMMISSION (EHNAC) Healthcare Management Service Organization Accreditation Program (MSOAP) For The HEALTHCARE INDUSTRY Version 1.0 Released: January 2011 Lee

More information

State HIPAA Security Policy State of Connecticut

State HIPAA Security Policy State of Connecticut Health Insurance Portability and Accountability Act State HIPAA Security Policy State of Connecticut Release 2.0 November 30 th, 2004 Table of Contents Executive Summary... 1 Policy Definitions... 3 1.

More information

Healthcare Compliance Solutions

Healthcare Compliance Solutions Privacy Compliance Healthcare Compliance Solutions Trust and privacy are essential for building meaningful human relationships. Let Protected Trust be your Safe Harbor The U.S. Department of Health and

More information

AOA HIPAA SECURITY REGULATION COMPLIANCE MANUAL

AOA HIPAA SECURITY REGULATION COMPLIANCE MANUAL AOA HIPAA SECURITY REGULATION COMPLIANCE MANUAL August, 2013 HIPAA SECURITY REGULATION COMPLIANCE DOCUMENTS For (Practice name) (Street Address) (City, State, ZIP) Adopted (Date) 2 INTRODUCTION The federal

More information

HIPAA Compliance: Are you prepared for the new regulatory changes?

HIPAA Compliance: Are you prepared for the new regulatory changes? HIPAA Compliance: Are you prepared for the new regulatory changes? Baker Tilly CARIS Innovation, Inc. April 30, 2013 Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed

More information

HIPAA Security. 5 Security Standards: Organizational, Policies. Security Topics. and Procedures and Documentation Requirements

HIPAA Security. 5 Security Standards: Organizational, Policies. Security Topics. and Procedures and Documentation Requirements HIPAA Security S E R I E S Security Topics 1. Security 101 for Covered Entities 2. Security Standards - Administrative Safeguards 3. Security Standards - Physical Safeguards 4. Security Standards - Technical

More information

Visa Inc. HIPAA Privacy and Security Policies and Procedures

Visa Inc. HIPAA Privacy and Security Policies and Procedures Visa Inc. HIPAA Privacy and Security Policies and Procedures Originally Effective April 14, 2003 (HIPAA Privacy) And April 21, 2005 (HIPAA Security) Further Amended Effective February 17, 2010, Unless

More information

Datto Compliance 101 1

Datto Compliance 101 1 Datto Compliance 101 1 Overview Overview This document provides a general overview of the Health Insurance Portability and Accounting Act (HIPAA) compliance requirements for Managed Service Providers (MSPs)

More information

HIPAA Security. 6 Basics of Risk Analysis and Risk Management. Security Topics

HIPAA Security. 6 Basics of Risk Analysis and Risk Management. Security Topics HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 2. Security Standards - Administrative Safeguards 3. Security Standards - Physical Safeguards 4. Security Standards - Technical

More information

City of Pittsburgh Operating Policies. Policy: HIPAA Privacy Policies Original Date: 1/2005 and Procedures Revised Date: 3/22/2010

City of Pittsburgh Operating Policies. Policy: HIPAA Privacy Policies Original Date: 1/2005 and Procedures Revised Date: 3/22/2010 City of Pittsburgh Operating Policies Policy: HIPAA Privacy Policies Original Date: 1/2005 and Procedures Revised Date: 3/22/2010 PURPOSE: To establish internal policies and procedures to ensure compliance

More information

Joseph Suchocki HIPAA Compliance 2015

Joseph Suchocki HIPAA Compliance 2015 Joseph Suchocki HIPAA Compliance 2015 Sponsored by Eagle Associates, Inc. Eagle Associates provides compliance services for over 1,200 practices nation wide. Services provided by Eagle Associates address

More information

HIPAA PRIVACY AND SECURITY FOR EMPLOYERS

HIPAA PRIVACY AND SECURITY FOR EMPLOYERS HIPAA PRIVACY AND SECURITY FOR EMPLOYERS Agenda Background and Enforcement HIPAA Privacy and Security Rules Breach Notification Rules HPID Number Why Does it Matter HIPAA History HIPAA Title II Administrative

More information

FACT SHEET: Ransomware and HIPAA

FACT SHEET: Ransomware and HIPAA FACT SHEET: Ransomware and HIPAA A recent U.S. Government interagency report indicates that, on average, there have been 4,000 daily ransomware attacks since early 2016 (a 300% increase over the 1,000

More information

CREATIVE SOLUTIONS IN HEALTHCARE, INC. Privacy Policy

CREATIVE SOLUTIONS IN HEALTHCARE, INC. Privacy Policy CREATIVE SOLUTIONS IN HEALTHCARE, INC. Privacy Policy Amended as of February 12, 2010 on the authority of the HIPAA Privacy Officer for Creative Solutions in Healthcare, Inc. TABLE OF CONTENTS ARTICLE

More information

HIPAA Compliance Guide

HIPAA Compliance Guide HIPAA Compliance Guide Important Terms Covered Entities (CAs) The HIPAA Privacy Rule refers to three specific groups as covered entities, including health plans, healthcare clearinghouses, and health care

More information

BREACH NOTIFICATION FOR UNSECURED PROTECTED HEALTH INFORMATION

BREACH NOTIFICATION FOR UNSECURED PROTECTED HEALTH INFORMATION BREACH NOTIFICATION FOR UNSECURED PROTECTED HEALTH INFORMATION Summary November 2009 On August 24, 2009, the Department of Health and Human Services (HHS) published an interim final rule (the Rule ) that

More information

Montclair State University. HIPAA Security Policy

Montclair State University. HIPAA Security Policy Montclair State University HIPAA Security Policy Effective: June 25, 2015 HIPAA Security Policy and Procedures Montclair State University is a hybrid entity and has designated Healthcare Components that

More information

District of Columbia Health Information Exchange Policy and Procedure Manual

District of Columbia Health Information Exchange Policy and Procedure Manual District of Columbia Health Information Exchange Policy and Procedure Manual HIPAA Privacy & Direct Privacy Policies (Version 1 November 27, 2012) Table of Contents Policy # Policy/Procedure Description

More information

Barnes & Thornburg LLP HIPAA Update: HITECH Act Breach Notification Rule

Barnes & Thornburg LLP HIPAA Update: HITECH Act Breach Notification Rule HEALTHCARE October 2009 Barnes & Thornburg LLP HIPAA Update: HITECH Act Breach Notification Rule This HIPAA Update provides a detailed description of the new breach notification requirements for HIPAA

More information

Security Is Everyone s Concern:

Security Is Everyone s Concern: Security Is Everyone s Concern: What a Practice Needs to Know About ephi Security Mert Gambito Hawaii HIE Compliance and Privacy Officer July 26, 2014 E Komo Mai! This session s presenter is Mert Gambito

More information

Securing the FOSS VistA Stack HIPAA Baseline Discussion. Jack L. Shaffer, Jr. Chief Operations Officer

Securing the FOSS VistA Stack HIPAA Baseline Discussion. Jack L. Shaffer, Jr. Chief Operations Officer Securing the FOSS VistA Stack HIPAA Baseline Discussion Jack L. Shaffer, Jr. Chief Operations Officer HIPAA as Baseline of security: To secure any stack which contains ephi (electonic Protected Health

More information

HIPAA SECURITY RULES FOR IT: WHAT ARE THEY?

HIPAA SECURITY RULES FOR IT: WHAT ARE THEY? HIPAA SECURITY RULES FOR IT: WHAT ARE THEY? HIPAA is a huge piece of legislation. Only a small portion of it applies to IT providers in healthcare; mostly the Security Rule. The HIPAA Security Rule outlines

More information

HIPAA Omnibus Rule Overview. Presented by: Crystal Stanton MicroMD Marketing Communication Specialist

HIPAA Omnibus Rule Overview. Presented by: Crystal Stanton MicroMD Marketing Communication Specialist HIPAA Omnibus Rule Overview Presented by: Crystal Stanton MicroMD Marketing Communication Specialist 1 HIPAA Omnibus Rule - Agenda History of the Omnibus Rule What is the HIPAA Omnibus Rule and its various

More information

Welcome to part 2 of the HIPAA Security Administrative Safeguards presentation. This presentation covers information access management, security

Welcome to part 2 of the HIPAA Security Administrative Safeguards presentation. This presentation covers information access management, security Welcome to part 2 of the HIPAA Security Administrative Safeguards presentation. This presentation covers information access management, security awareness training, and security incident procedures. The

More information

C.T. Hellmuth & Associates, Inc.

C.T. Hellmuth & Associates, Inc. Technical Monograph C.T. Hellmuth & Associates, Inc. Technical Monographs usually are limited to only one subject which is treated in considerably more depth than is possible in our Executive Newsletter.

More information

PRIVACY POLICIES AND FORMS FOR BUSINESS ASSOCIATES

PRIVACY POLICIES AND FORMS FOR BUSINESS ASSOCIATES PRIVACY POLICIES AND FORMS FOR BUSINESS ASSOCIATES TABLE OF CONTENTS A. Overview of HIPAA Compliance Program B. General Policies 1. Glossary of Defined Terms Used in HIPAA Policies and Procedures 2. Privacy

More information

HIPAA Security Matrix

HIPAA Security Matrix HIPAA Matrix Hardware : 164.308(a)(1) Management Process =Required, =Addressable Risk Analysis The Covered Entity (CE) can store its Risk Analysis document encrypted and offsite using EVault managed software

More information

COMPLIANCE ALERT 10-12

COMPLIANCE ALERT 10-12 HAWAII HEALTH SYSTEMS C O R P O R A T I O N "Touching Lives Every Day COMPLIANCE ALERT 10-12 HIPAA Expansion under the American Recovery and Reinvestment Act of 2009 The American Recovery and Reinvestment

More information

HIPAA: Understanding The Omnibus Rule and Keeping Your Business Compliant

HIPAA: Understanding The Omnibus Rule and Keeping Your Business Compliant 1 HIPAA: Understanding The Omnibus Rule and Keeping Your Business Compliant Introduction U.S. healthcare laws intended to protect patient information (Protected Health Information or PHI) and the myriad

More information

HIPAA Security Rule Compliance

HIPAA Security Rule Compliance HIPAA Security Rule Compliance Caryn Reiker MAXIS360 HIPAA Security Rule Compliance what is it and why you should be concerned about it Table of Contents About HIPAA... 2 Who Must Comply... 2 The HIPAA

More information

HIPAA Audit Risk Assessment - Risk Factors

HIPAA Audit Risk Assessment - Risk Factors I II Compliance Compliance I Compliance II SECTION ONE COVERED ENTITY RESPONSIBILITIES AREA ONE Notice of Privacy Practices 1 Is your full notice of privacy practices given to every new patient in your

More information

Complying with 45 CFR 164 HIPAA Security Standards; Final Rule

Complying with 45 CFR 164 HIPAA Security Standards; Final Rule Complying with 45 CFR 164 HIPAA Security Standards; Final Rule Implement best practices by using FileMaker Pro 7 as the backbone of your HIPAA compliant system. By Todd Duell This final rule adopts standards

More information

Can Your Diocese Afford to Fail a HIPAA Audit?

Can Your Diocese Afford to Fail a HIPAA Audit? Can Your Diocese Afford to Fail a HIPAA Audit? PETULA WORKMAN & PHIL BUSHNELL MAY 2016 2016 ARTHUR J. GALLAGHER & CO. BUSINESS WITHOUT BARRIERS Agenda Overview Privacy Security Breach Notification Miscellaneous

More information

IBM Internet Security Systems. The IBM Internet Security Systems approach for Health Insurance Portability and Accountability Act compliance overview

IBM Internet Security Systems. The IBM Internet Security Systems approach for Health Insurance Portability and Accountability Act compliance overview IBM Internet Security Systems The IBM Internet Security Systems approach for Health Insurance Portability and Accountability Act compliance overview Health Insurance Portability and Accountability Act

More information

Support for the HIPAA Security Rule

Support for the HIPAA Security Rule WHITE PAPER Support for the HIPAA Security Rule PowerScribe 360 Reporting v2.0 HEALTHCARE 2 SUMMARY This white paper is intended to assist Nuance customers who are evaluating the security aspects of PowerScribe

More information

Data Security and Integrity of e-phi. MLCHC Annual Clinical Conference Worcester, MA Wednesday, November 12, 2014 2:15pm 3:30pm

Data Security and Integrity of e-phi. MLCHC Annual Clinical Conference Worcester, MA Wednesday, November 12, 2014 2:15pm 3:30pm Electronic Health Records: Data Security and Integrity of e-phi Worcester, MA Wednesday, 2:15pm 3:30pm Agenda Introduction Learning Objectives Overview of HIPAA HIPAA: Privacy and Security HIPAA: The Security

More information

FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information

FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1

More information

Telemedicine HIPAA/HITECH Privacy and Security

Telemedicine HIPAA/HITECH Privacy and Security Telemedicine HIPAA/HITECH Privacy and Security 1 Access Control Role Based Access The organization shall provide secure rolebased account management. Privileges granted utilizing the principle of least

More information

HIPAA and Mental Health Privacy:

HIPAA and Mental Health Privacy: HIPAA and Mental Health Privacy: What Social Workers Need to Know Presenter: Sherri Morgan, JD, MSW Associate Counsel, NASW Legal Defense Fund and Office of Ethics & Professional Review 2010 National Association

More information

Security Framework Information Security Management System

Security Framework Information Security Management System NJ Department of Human Services Security Framework - Information Security Management System Building Technology Solutions that Support the Care, Protection and Empowerment of our Clients JAMES M. DAVY

More information

HIPAA Security Policies & Procedures (HITECH updated)

HIPAA Security Policies & Procedures (HITECH updated) Why Create HIPAA Security Policies and Procedures? The final HIPAA Security rule published on February 20, 2003 requires that healthcare organizations create HIPAA Security policies and procedures to apply

More information

ARTICLE 14 INFORMATION PRIVACY AND SECURITY PROVISIONS

ARTICLE 14 INFORMATION PRIVACY AND SECURITY PROVISIONS A. This Article is intended to protect the privacy and security of specified County information that Contractor may receive, access, or transmit, under this Agreement. The County information covered under

More information

HIPAA Security Education. Updated May 2016

HIPAA Security Education. Updated May 2016 HIPAA Security Education Updated May 2016 Course Objectives v This computer-based learning course covers the HIPAA, HITECH, and MSHA Privacy and Security Program which includes relevant Information Technology(IT)

More information

M E M O R A N D U M. Definitions

M E M O R A N D U M. Definitions M E M O R A N D U M DATE: November 10, 2011 TO: FROM: RE: Krevolin & Horst, LLC HIPAA Obligations of Business Associates In connection with the launch of your hosted application service focused on practice

More information

Procedure Title: TennDent HIPAA Security Awareness and Training

Procedure Title: TennDent HIPAA Security Awareness and Training Procedure Title: TennDent HIPAA Security Awareness and Training Number: TD-QMP-P-7011 Subject: Security Awareness and Training Primary Department: TennDent Effective Date of Procedure: 9/23/2011 Secondary

More information

New Boundary Technologies HIPAA Security Guide

New Boundary Technologies HIPAA Security Guide New Boundary Technologies HIPAA Security Guide A New Boundary Technologies HIPAA Security Configuration Guide Based on NIST Special Publication 800-68 December 2005 1.0 Executive Summary This HIPAA Security

More information

Security Manual for Protected Health Information

Security Manual for Protected Health Information Security Manual for Protected Health Information Revised September 2011 Contents PREFACE... 4 TTUHSC Operating Policy Regarding Privacy and Security... 5 1. DEFINITIONS:... 6 2. ADMINISTRATIVE SAFEGUARDS

More information

Protecting Patient Information in an Electronic Environment- New HIPAA Requirements

Protecting Patient Information in an Electronic Environment- New HIPAA Requirements Protecting Patient Information in an Electronic Environment- New HIPAA Requirements SD Dental Association Holly Arends, RHIT Clinical Program Manager Meet the Speaker TRUST OBJECTIVES Overview of HIPAA

More information

Table of Contents INTRODUCTION AND PURPOSE 1

Table of Contents INTRODUCTION AND PURPOSE 1 HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 ( HIPAA ) COMPLIANCE PROGRAM Adopted December 2008: Revised February 2009, May, 2012, and August 2013 Table of Contents INTRODUCTION AND PURPOSE

More information

POLICY AND PROCEDURE MANUAL

POLICY AND PROCEDURE MANUAL Pennington Biomedical POLICY NO. 412.22 POLICY AND PROCEDURE MANUAL Origin Date: 02/04/2013 Impacts: ALL PERSONNEL Effective Date: 03/17/2014 Subject: HIPAA BREACH NOTIFICATION Last Revised: Source: LEGAL

More information

HIPAA: In Plain English

HIPAA: In Plain English HIPAA: In Plain English Material derived from a presentation by Kris K. Hughes, Esq. Posted with permission from the author. The Health Insurance Portability and Accountability Act of 1996 (HIPAA), Pub.

More information

Administrators Guide Multi User Systems. Calendar Year

Administrators Guide Multi User Systems. Calendar Year Calendar Year 2012 Enter Facility Name Here HIPAA Security Compliance Workbook For Core Measure 15 of Meaningful Use Requirements Annual Risk Analysis Administrators Guide Multi User Systems 1 HIPPA Compliance

More information

ADMINISTRATIVE REGULATION EFFECTIVE DATE: 1/1/2016

ADMINISTRATIVE REGULATION EFFECTIVE DATE: 1/1/2016 Page 1 of 9 CITY OF CHESAPEAKE, VIRGINIA NUMBER: 2.62 ADMINISTRATIVE REGULATION EFFECTIVE DATE: 1/1/2016 SUPERCEDES: N/A SUBJECT: HUMAN RESOURCES DEPARTMENT CITY OF CHESAPEAKE EMPLOYEE/RETIREE GROUP HEALTH

More information

An Oracle White Paper December 2010. Leveraging Oracle Enterprise Single Sign-On Suite Plus to Achieve HIPAA Compliance

An Oracle White Paper December 2010. Leveraging Oracle Enterprise Single Sign-On Suite Plus to Achieve HIPAA Compliance An Oracle White Paper December 2010 Leveraging Oracle Enterprise Single Sign-On Suite Plus to Achieve HIPAA Compliance Executive Overview... 1 Health Information Portability and Accountability Act Security

More information

HIPAA Security. Jeanne Smythe, UNC-CH Jack McCoy, ECU Chad Bebout, UNC-CH Doug Brown, UNC-CH

HIPAA Security. Jeanne Smythe, UNC-CH Jack McCoy, ECU Chad Bebout, UNC-CH Doug Brown, UNC-CH HIPAA Security Jeanne Smythe, UNC-CH Jack McCoy, ECU Chad Bebout, UNC-CH Doug Brown, UNC-CH What is this? Federal Regulations August 21, 1996 HIPAA Became Law October 16, 2003 Transaction Codes and Identifiers

More information

INITIAL APPROVAL DATE INITIAL EFFECTIVE DATE

INITIAL APPROVAL DATE INITIAL EFFECTIVE DATE TITLE AND INFORMATION TECHNOLOGY RESOURCES DOCUMENT # 1107 APPROVAL LEVEL Alberta Health Services Executive Committee SPONSOR Legal & Privacy / Information Technology CATEGORY Information and Technology

More information

Unified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES

Unified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES Unified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES HIPAA COMPLIANCE Achieving HIPAA Compliance with Security Professional Services The Health Insurance

More information

SAMPLE TEMPLATE. Massachusetts Written Information Security Plan

SAMPLE TEMPLATE. Massachusetts Written Information Security Plan SAMPLE TEMPLATE Massachusetts Written Information Security Plan Developed by: Jamy B. Madeja, Esq. Erik Rexford 617-227-8410 jmadeja@buchananassociates.com Each business is required by Massachusetts law

More information

HIPAA Security. 1 Security 101 for Covered Entities. Security Topics

HIPAA Security. 1 Security 101 for Covered Entities. Security Topics HIPAA SERIES Topics 1. 101 for Covered Entities 2. Standards - Administrative Safeguards 3. Standards - Physical Safeguards 4. Standards - Technical Safeguards 5. Standards - Organizational, Policies &

More information

CHIS, Inc. Privacy General Guidelines

CHIS, Inc. Privacy General Guidelines CHIS, Inc. and HIPAA CHIS, Inc. provides services to healthcare facilities and uses certain protected health information (PHI) in connection with performing these services. Therefore, CHIS, Inc. is classified

More information

HIPAA Assessment HIPAA Policy and Procedures

HIPAA Assessment HIPAA Policy and Procedures Sample Client HIPAA Assessment HIPAA Policy and Procedures Sample Client Prepared by: InhouseCIO, LLC CONFIDENTIALITY NOTE: The information contained in this report document is for the exclusive use of

More information

RAYSAFE S1 SECURITY WHITEPAPER VERSION B. RaySafe S1 SECURITY WHITEPAPER

RAYSAFE S1 SECURITY WHITEPAPER VERSION B. RaySafe S1 SECURITY WHITEPAPER RaySafe S1 SECURITY WHITEPAPER Contents 1. INTRODUCTION 2 ARCHITECTURE OVERVIEW 2.1 Structure 3 SECURITY ASPECTS 3.1 Security Aspects for RaySafe S1 Data Collector 3.2 Security Aspects for RaySafe S1 cloud-based

More information

PHI- Protected Health Information

PHI- Protected Health Information HIPAA Policy 2014 The Health Insurance Portability and Accountability Act is a federal law that protects the privacy and security of patients health information and grants certain rights to patients. Clarkson

More information

Security Compliance, Vendor Questions, a Word on Encryption

Security Compliance, Vendor Questions, a Word on Encryption Security Compliance, Vendor Questions, a Word on Encryption Alexis Parsons, RHIT, CPC, MA Director, Health Information Services Security/Privacy Officer Shasta Community Health Center aparsons@shastahealth.org

More information

UNDERSTANDING THE HIPAA/HITECH BREACH NOTIFICATION RULE 2/25/14

UNDERSTANDING THE HIPAA/HITECH BREACH NOTIFICATION RULE 2/25/14 UNDERSTANDING THE HIPAA/HITECH BREACH NOTIFICATION RULE 2/25/14 RULES Issued August 19, 2009 Requires Covered Entities to notify individuals of a breach as well as HHS without reasonable delay or within

More information

When HHS Calls, Will Your Plan Be HIPAA Compliant?

When HHS Calls, Will Your Plan Be HIPAA Compliant? When HHS Calls, Will Your Plan Be HIPAA Compliant? Petula Workman, J.D., CEBS Division Vice President Compliance Counsel Gallagher Benefit Services, Inc., Sugar Land, Texas The opinions expressed in this

More information

WHITE PAPER. Support for the HIPAA Security Rule RadWhere 3.0

WHITE PAPER. Support for the HIPAA Security Rule RadWhere 3.0 WHITE PAPER Support for the HIPAA Security Rule RadWhere 3.0 SUMMARY This white paper is intended to assist Nuance customers who are evaluating the security aspects of the RadWhere 3.0 system as part of

More information

ISLAND COUNTY SECURITY POLICIES & PROCEDURES

ISLAND COUNTY SECURITY POLICIES & PROCEDURES Health Insurance Portability and Accountability Act (HIPAA) ISLAND COUNTY SECURITY POLICIES & PROCEDURES Island County HIPAA Security Rule Page 1 Table of Contents Table of Contents... 2 Authority... 3

More information

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable

More information

HIPAA Omnibus Rule Practice Impact. Kristen Heffernan MicroMD Director of Prod Mgt and Marketing

HIPAA Omnibus Rule Practice Impact. Kristen Heffernan MicroMD Director of Prod Mgt and Marketing HIPAA Omnibus Rule Practice Impact Kristen Heffernan MicroMD Director of Prod Mgt and Marketing 1 HIPAA Omnibus Rule Agenda History of the Rule HIPAA Stats Rule Overview Use of Personal Health Information

More information